Configuring Security Center to trigger intrusion alarms on any intrusion panel - Security Center 5.11

Security Center Administrator Guide 5.11

Product
Security Center
Content type
Guides > Administrator guides
Version
5.11
Language
English
Last updated
2024-07-05

You can configure Security Center to trigger alarms on intrusion panels, regardless of their model. This is done by physically connecting the input pin associated to an alarm to an output relay on the panel, and configuring the pair as a virtual alarm in Config Tool.

Before you begin

Do the following preparation on the intrusion panel:
  • Associate an input pin to an alarm on the intrusion panel. You might need a proprietary software.
  • Physically connect that input pin to an output relay on the same panel.

What you should know

We use the Trigger intrusion alarm action to activate alarms on intrusion detection areas. But not all intrusion panel models support the alarm activation from an external source. For panels that do not support this feature, a workaround exists. The solution is to physically connect an output to an alarm input on the intrusion panel. We call this configuration, a virtual alarm, and the input that you physically connected to the output, a virtual input. When the virtual alarm is configured, Security Center sends a signal to the output that is physically connected to the alarm input when the Trigger intrusion alarm action is used, thus activating the intrusion alarm.

Procedure

  1. From the Config Tool homepage, open the Area view task.
  2. Select the intrusion detection area () to configure, and click the Properties tab.
  3. From the Output list, select the output relay that is physically connected to the input pin.
  4. From the Input list, select the input pin that is physically connected to the output relay.
  5. Click Apply.
    The input icon changes to , meaning that it is now a virtual input.
    Intrusion detection area - Properties page

Results

Now, you can configure event-to-actions to trigger the action Trigger intrusion alarm on this intrusion detection area. The source entity of the event used to trigger the intrusion alarm will be shown as the alarm source on a map if you monitor this intrusion detection area on a map, and as the initiator of the intrusion detection area alarm activated event in the Intrusion detection area activities report.

Example

Suppose you create an event-to-action to trigger the Trigger intrusion alarm action on Access denied (at a door) event, the door where access is being denied would be shown as the alarm source in your Monitoring task and on the map. If on top of that, you configure a second event-to-action to trigger the same action on Access denied (to cardholder) event, the cardholder would also be shown as the alarm source when the event occurs.
Intrusion alarm shown on map